General

  • Target

    4bdb1e053a3f893f0a0560124915e26f_JaffaCakes118

  • Size

    2.0MB

  • Sample

    240715-3dd2vsvajn

  • MD5

    4bdb1e053a3f893f0a0560124915e26f

  • SHA1

    1f65309c9e341b6950b69505f132a229a61f4537

  • SHA256

    74818ceb11f1c538bb637d333c6a6c2cf2606829598c14423878e8ce2e9a9a53

  • SHA512

    4954a567cb313263924ed215eb9dca680fe26b24e52c8a83ca60a4b6a99a950dafe0f8e37c99c9586a21edf420c7d0d61014346b26be71d6a5a81add1d8a1ffe

  • SSDEEP

    24576:hBWC00PGDUzrKqNYdqqdnwKnLkdWREvODMHZH/wWr7hdsQvfsl7quLVt:hwCfEqNyFwKZWnWDV

Malware Config

Extracted

Credentials

  • Protocol:
    smtp
  • Host:
    smtp.gmail.com
  • Port:
    587
  • Username:
    [email protected]
  • Password:
    22logitech2212

Targets

    • Target

      4bdb1e053a3f893f0a0560124915e26f_JaffaCakes118

    • Size

      2.0MB

    • MD5

      4bdb1e053a3f893f0a0560124915e26f

    • SHA1

      1f65309c9e341b6950b69505f132a229a61f4537

    • SHA256

      74818ceb11f1c538bb637d333c6a6c2cf2606829598c14423878e8ce2e9a9a53

    • SHA512

      4954a567cb313263924ed215eb9dca680fe26b24e52c8a83ca60a4b6a99a950dafe0f8e37c99c9586a21edf420c7d0d61014346b26be71d6a5a81add1d8a1ffe

    • SSDEEP

      24576:hBWC00PGDUzrKqNYdqqdnwKnLkdWREvODMHZH/wWr7hdsQvfsl7quLVt:hwCfEqNyFwKZWnWDV

    • RevengeRAT

      Remote-access trojan with a wide range of capabilities.

    • RevengeRat Executable

    • ACProtect 1.3x - 1.4x DLL software

      Detects file using ACProtect software.

    • Executes dropped EXE

    • Loads dropped DLL

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • UPX packed file

      Detects executables packed with UPX/modified UPX open source packer.

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks